+=item B
Stray space after before and after "RDM_RESERVE_STRING".
Sure,
=item B
+
+(HVM/x86 only) Specifies the information about Reserved Device Memory (RDM),
+which is necessary to enable robust device passthrough usage. One example of
Delete "usage".
Okay.
+RDM is reported thro
On 2015/6/3 0:29, Wei Liu wrote:
On Fri, May 22, 2015 at 05:35:04PM +0800, Tiejun Chen wrote:
While building a VM, HVM domain builder provides struct hvm_info_table{}
to help hvmloader. Currently it includes two fields to construct guest
e820 table by hvmloader, low_mem_pgend and high_mem_pgend.
On 2015/6/3 0:36, Wei Liu wrote:
On Fri, May 22, 2015 at 05:35:08PM +0800, Tiejun Chen wrote:
This patch passes rdm reservation policy to xc_assign_device() so the policy
is checked when assigning devices to a VM.
Signed-off-by: Tiejun Chen
---
tools/libxc/include/xenctrl.h | 3 ++-
On 2015/6/3 0:42, Wei Liu wrote:
On Fri, May 22, 2015 at 05:35:10PM +0800, Tiejun Chen wrote:
Here we'll construct a basic guest e820 table via
XENMEM_set_memory_map. This table includes lowmem, highmem
and RDMs if they exist. And hvmloader would need this info
later.
Signed-off-by: Tiejun Chen
On 2015/6/7 19:06, Wei Liu wrote:
On Wed, Jun 03, 2015 at 09:35:16AM +0800, Chen, Tiejun wrote:
[...]
+reserved regions explicitly. And using "host" to include all reserved regions
+reported on this platform which is good to handle hotplug scenario. In the
+future this parame
On 2015/6/7 19:20, Wei Liu wrote:
On Wed, Jun 03, 2015 at 10:25:47AM +0800, Chen, Tiejun wrote:
[...]
+static struct xen_reserved_device_memory
+*xc_device_get_rdm(libxl__gc *gc,
+ uint32_t flag,
+ uint16_t seg,
+ uint8_t bus
On 2015/6/7 19:27, Wei Liu wrote:
On Wed, Jun 03, 2015 at 10:58:31AM +0800, Chen, Tiejun wrote:
On 2015/6/3 0:36, Wei Liu wrote:
On Fri, May 22, 2015 at 05:35:08PM +0800, Tiejun Chen wrote:
This patch passes rdm reservation policy to xc_assign_device() so the policy
is checked when assigning
On 2015/6/11 15:33, Jan Beulich wrote:
On 11.06.15 at 03:15, wrote:
We will create this sort of identity mapping as follows:
If the gfn space is unoccupied, we just set the mapping. If the space
is already occupied by 1:1 mappings, do nothing. Failed for any
other cases.
Signed-off-by: Tiejun
On 2015/6/11 16:42, Tian, Kevin wrote:
From: Jan Beulich [mailto:jbeul...@suse.com]
Sent: Thursday, June 11, 2015 3:28 PM
On 11.06.15 at 03:15, wrote:
v3:
* Rearrange all patches orderly as Wei suggested
* Rebase on the latest tree
* Address some Wei's comments on tools side
* Two changes fo
On 2015/6/11 17:00, Tian, Kevin wrote:
From: Chen, Tiejun
Sent: Thursday, June 11, 2015 9:15 AM
We will create this sort of identity mapping as follows:
If the gfn space is unoccupied, we just set the mapping. If the space
is already occupied by 1:1 mappings, do nothing. Failed for any
other
On 2015/6/11 17:23, Jan Beulich wrote:
On 11.06.15 at 10:23, wrote:
On 2015/6/11 15:33, Jan Beulich wrote:
On 11.06.15 at 03:15, wrote:
We will create this sort of identity mapping as follows:
If the gfn space is unoccupied, we just set the mapping. If the space
is already occupied by 1:1 m
On 2015/6/11 17:14, Tian, Kevin wrote:
From: Chen, Tiejun
Sent: Thursday, June 11, 2015 9:15 AM
RMRR reserved regions must be setup in the pfn space with an identity
mapping to reported mfn. However existing code has problem to setup
correct mapping when VT-d shares EPT page table, so lead to
On 2015/6/11 20:52, Tim Deegan wrote:
Hi,
At 09:15 +0800 on 11 Jun (1434014109), Tiejun Chen wrote:
* Two changes for runtime cycle
patch #2,xen/x86/p2m: introduce set_identity_p2m_entry, on hypervisor side
a>. Introduce paging_mode_translate()
Otherwise, we'll see this error when bo
On 2015/6/11 22:07, Tim Deegan wrote:
At 17:31 +0800 on 11 Jun (1434043916), Chen, Tiejun wrote:
while ( base_pfn < end_pfn )
{
-int err = intel_iommu_map_page(d, base_pfn, base_pfn,
- IOMMUF_readable|IOMMUF_writable);
+int
On 2015/6/12 10:43, Chen, Tiejun wrote:
On 2015/6/11 22:07, Tim Deegan wrote:
At 17:31 +0800 on 11 Jun (1434043916), Chen, Tiejun wrote:
while ( base_pfn < end_pfn )
{
-int err = intel_iommu_map_page(d, base_pfn, base_pfn,
-
IOMMUF_readable|IOMMUF_writable);
+
On 2015/6/12 13:59, Tian, Kevin wrote:
From: Chen, Tiejun
Sent: Friday, June 12, 2015 1:58 PM
On 2015/6/12 10:43, Chen, Tiejun wrote:
On 2015/6/11 22:07, Tim Deegan wrote:
At 17:31 +0800 on 11 Jun (1434043916), Chen, Tiejun wrote:
while ( base_pfn < end_pfn )
{
-
On 2015/6/11 17:28, Tian, Kevin wrote:
From: Chen, Tiejun
Sent: Thursday, June 11, 2015 9:15 AM
This patch extends the existing hypercall to support rdm reservation policy.
We return error or just throw out a warning message depending on whether
the policy is "strict" or &quo
On 2015/6/11 17:38, Tian, Kevin wrote:
From: Chen, Tiejun
Sent: Thursday, June 11, 2015 9:15 AM
Now we get this map layout by call XENMEM_memory_map then
save them into one global variable memory_map[]. It should
include lowmem range, rdm range and highmem range. Note
rdm range and highmem
On 2015/6/11 17:51, Tian, Kevin wrote:
From: Chen, Tiejun
Sent: Thursday, June 11, 2015 9:15 AM
When allocating mmio address for PCI bars, we need to make
sure they don't overlap with reserved regions.
Signed-off-by: Tiejun Chen
---
tools/firmware/hvmloader/pci.c
On 2015/6/11 17:59, Tian, Kevin wrote:
From: Chen, Tiejun
Sent: Thursday, June 11, 2015 9:15 AM
Now we can use that memory map to build our final
e820 table but it may need to reorder all e820
entries.
Signed-off-by: Tiejun Chen
---
tools/firmware/hvmloader/e820.c | 62
On 2015/6/12 16:04, Jan Beulich wrote:
On 12.06.15 at 04:10, wrote:
On 2015/6/11 20:52, Tim Deegan wrote:
which would be better handeld explicitly:
if ( p2mt == p2m_invalid || p2mt == p2m_mmio_dm )
...
So if I'm correct, we should do this check explicitly,
i
On 2015/6/11 18:02, Tian, Kevin wrote:
From: Chen, Tiejun
Sent: Thursday, June 11, 2015 9:15 AM
This patch passes rdm reservation policy to xc_assign_device() so the policy
is checked when assigning devices to a VM.
Signed-off-by: Tiejun Chen
---
tools/libxc/include/xenctrl.h | 3
On 2015/6/11 18:19, Tian, Kevin wrote:
From: Chen, Tiejun
Sent: Thursday, June 11, 2015 9:15 AM
While building a VM, HVM domain builder provides struct hvm_info_table{}
to help hvmloader. Currently it includes two fields to construct guest
e820 table by hvmloader, low_mem_pgend and
On 2015/6/11 18:25, Tian, Kevin wrote:
From: Chen, Tiejun
Sent: Thursday, June 11, 2015 9:15 AM
Currently we're intending to cover this kind of devices
we're -> we're not?
I mean currently we want to handle this shared case *simply* so I think
its still "we'
On 2015/6/11 18:22, Tian, Kevin wrote:
From: Chen, Tiejun
Sent: Thursday, June 11, 2015 9:15 AM
Before we refine RMRR mechanism, USB RMRR may conflict with guest bios
region so we always ignore USB RMRR.
If USB RMRR conflicts with guest bios, the conflict is always there
before and after your
On 2015/6/12 16:45, Jan Beulich wrote:
On 12.06.15 at 08:31, wrote:
On 2015/6/11 17:28, Tian, Kevin wrote:
From: Chen, Tiejun
Sent: Thursday, June 11, 2015 9:15 AM
@@ -1940,7 +1942,8 @@ static int intel_iommu_remove_device(u8 devfn, struct
pci_dev
*pdev)
PCI_DEVFN2(bdf
On 2015/6/12 23:43, Wei Liu wrote:
On Thu, Jun 11, 2015 at 09:15:19AM +0800, Tiejun Chen wrote:
[...]
-static int next_bdf(char **str, int *seg, int *bus, int *dev, int *func)
+static int next_bdf(char **str, int *seg, int *bus, int *dev, int *func,
+int *flag)
This is unr
On 2015/6/13 0:02, Wei Liu wrote:
On Thu, Jun 11, 2015 at 09:15:20AM +0800, Tiejun Chen wrote:
This patch introduces user configurable parameters to specify RDM
resource and according policies,
Global RDM parameter:
rdm = "type=none/host,reserve=strict/relaxed"
Per-device RDM parameter:
On 2015/6/13 0:17, Wei Liu wrote:
On Thu, Jun 11, 2015 at 09:15:21AM +0800, Tiejun Chen wrote:
This patch passes our rdm reservation policy inside libxl
when we assign a device or attach a device.
Signed-off-by: Tiejun Chen
---
docs/man/xl.pod.1 | 7 ++-
tools/libxl/libxl_pci.c
On 2015/6/13 0:39, Wei Liu wrote:
On Thu, Jun 11, 2015 at 09:15:22AM +0800, Tiejun Chen wrote:
[...]
+++ b/tools/libxc/xc_hvm_build_x86.c
@@ -21,6 +21,7 @@
#include
#include
#include
+#include
#include "xg_private.h"
#include "xc_private.h"
@@ -270,7 +271,7 @@ static int setup_gue
On 2015/6/13 0:43, Wei Liu wrote:
On Thu, Jun 11, 2015 at 09:15:23AM +0800, Tiejun Chen wrote:
Here we'll construct a basic guest e820 table via
XENMEM_set_memory_map. This table includes lowmem, highmem
and RDMs if they exist. And hvmloader would need this info
later.
Signed-off-by: Tiejun Che
On 2015/6/12 17:20, Chen, Tiejun wrote:
On 2015/6/12 16:45, Jan Beulich wrote:
On 12.06.15 at 08:31, wrote:
On 2015/6/11 17:28, Tian, Kevin wrote:
From: Chen, Tiejun
Sent: Thursday, June 11, 2015 9:15 AM
@@ -1940,7 +1942,8 @@ static int intel_iommu_remove_device(u8
devfn, struct pci_dev
Please ignore this email and sorry for any inconvenience.
Thanks
Tiejun
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
On 2015/6/15 23:01, Wei Liu wrote:
On Mon, Jun 15, 2015 at 09:50:49AM +0800, Chen, Tiejun wrote:
[...]
+ uint32_t flag,
+ uint16_t seg,
+ uint8_t bus,
+ uint8_t devfn,
+ unsigned int *nr_entries
On 2015/6/15 22:58, Wei Liu wrote:
On Mon, Jun 15, 2015 at 09:12:17AM +0800, Chen, Tiejun wrote:
On 2015/6/12 23:43, Wei Liu wrote:
On Thu, Jun 11, 2015 at 09:15:19AM +0800, Tiejun Chen wrote:
[...]
-static int next_bdf(char **str, int *seg, int *bus, int *dev, int *func)
+static int
On 2015/6/16 13:58, Tian, Kevin wrote:
From: Chen, Tiejun
Sent: Friday, June 12, 2015 5:00 PM
On 2015/6/11 18:22, Tian, Kevin wrote:
From: Chen, Tiejun
Sent: Thursday, June 11, 2015 9:15 AM
Before we refine RMRR mechanism, USB RMRR may conflict with guest bios
region so we always ignore USB
On 2015/6/16 13:47, Tian, Kevin wrote:
From: Chen, Tiejun
Sent: Friday, June 12, 2015 3:54 PM
bar_data |= (uint32_t)base;
bar_data_upper = (uint32_t)(base >> 32);
+for ( j = 0; j < memory_map.nr_map ; j++ )
+{
+if ( memory_map.ma
On 2015/6/16 17:40, Jan Beulich wrote:
On 16.06.15 at 11:29, wrote:
I'm trying to walk into this direction:
/*
* We'll skip all space overlapping with reserved memory later,
* so we need to increase mmio_total to compensate them.
*/
for ( j = 0; j < memory_map.
On 2015/6/17 15:19, Jan Beulich wrote:
On 17.06.15 at 09:10, wrote:
On 2015/6/16 17:40, Jan Beulich wrote:
On 16.06.15 at 11:29, wrote:
I'm trying to walk into this direction:
/*
* We'll skip all space overlapping with reserved memory later,
* so we need to increase m
On 2015/6/17 16:05, Jan Beulich wrote:
On 17.06.15 at 09:54, wrote:
On 2015/6/17 15:19, Jan Beulich wrote:
On 17.06.15 at 09:10, wrote:
Yeah, this may waste some spaces in this worst case but I this think
this can guarantee our change don't impact on the original expectation,
right?
"Some
On 2015/6/17 16:26, Chen, Tiejun wrote:
On 2015/6/17 16:05, Jan Beulich wrote:
On 17.06.15 at 09:54, wrote:
On 2015/6/17 15:19, Jan Beulich wrote:
On 17.06.15 at 09:10, wrote:
Yeah, this may waste some spaces in this worst case but I this think
this can guarantee our change don't impa
On 2015/6/17 17:02, Jan Beulich wrote:
On 17.06.15 at 10:26, wrote:
Something hits me to generate another idea,
#1. Still allocate all devices as before.
#2. Lookup all actual bars to check if they're conflicting RMRR
We can skip these bars to keep zero. Then later it would make lookup easily
On 2015/6/17 17:24, Jan Beulich wrote:
On 17.06.15 at 11:18, wrote:
On 2015/6/17 17:02, Jan Beulich wrote:
On 17.06.15 at 10:26, wrote:
Something hits me to generate another idea,
#1. Still allocate all devices as before.
#2. Lookup all actual bars to check if they're conflicting RMRR
We c
On 2015/6/17 18:03, Jan Beulich wrote:
On 11.06.15 at 03:15, wrote:
--- a/xen/arch/x86/mm/p2m.c
+++ b/xen/arch/x86/mm/p2m.c
@@ -927,10 +927,16 @@ int set_identity_p2m_entry(struct domain *d, unsigned
long gfn,
}
gfn_unlock(p2m, gfn, 0);
-return ret;
}
+el
On 2015/6/18 14:29, Jan Beulich wrote:
On 18.06.15 at 08:17, wrote:
On 2015/6/17 17:24, Jan Beulich wrote:
On 17.06.15 at 11:18, wrote:
On 2015/6/17 17:02, Jan Beulich wrote:
On 17.06.15 at 10:26, wrote:
Something hits me to generate another idea,
#1. Still allocate all devices as before
On 2015/6/17 18:11, Jan Beulich wrote:
On 11.06.15 at 03:15, wrote:
@@ -899,7 +899,7 @@ int set_mmio_p2m_entry(struct domain *d, unsigned long gfn,
mfn_t mfn,
}
int set_identity_p2m_entry(struct domain *d, unsigned long gfn,
- p2m_access_t p2ma)
+
On 2015/6/18 15:53, Jan Beulich wrote:
On 18.06.15 at 09:14, wrote:
On 2015/6/17 18:11, Jan Beulich wrote:
On 11.06.15 at 03:15, wrote:
@@ -1577,9 +1578,10 @@ int iommu_do_pci_domctl(
seg = machine_sbdf >> 16;
bus = PCI_BUS(machine_sbdf);
devfn = PCI_DEVFN2(m
On 2015/6/17 18:14, Jan Beulich wrote:
On 11.06.15 at 03:15, wrote:
This patch enables XENMEM_memory_map in hvm. So we can use it to
setup the e820 mappings.
I think saying "hvmloader" instead of "we" would make things more
explicit. In the context here, "we" would be the hypervisor, and
Fi
On 2015/6/17 18:22, Jan Beulich wrote:
On 11.06.15 at 03:15, wrote:
--- a/tools/firmware/hvmloader/hvmloader.c
+++ b/tools/firmware/hvmloader/hvmloader.c
@@ -107,6 +107,8 @@ asm (
".text \n"
);
+struct e820map memory_map;
Imo this should live in e820.c.
On 2015/6/17 18:28, Jan Beulich wrote:
On 11.06.15 at 03:15, wrote:
--- a/xen/drivers/passthrough/vtd/iommu.c
+++ b/xen/drivers/passthrough/vtd/iommu.c
@@ -2277,13 +2277,37 @@ static int intel_iommu_assign_device(
if ( list_empty(&acpi_drhd_units) )
return -ENODEV;
+seg = p
On 2015/6/18 17:13, Jan Beulich wrote:
On 18.06.15 at 10:48, wrote:
On 2015/6/18 15:53, Jan Beulich wrote:
On 18.06.15 at 09:14, wrote:
On 2015/6/17 18:11, Jan Beulich wrote:
On 11.06.15 at 03:15, wrote:
@@ -1577,9 +1578,10 @@ int iommu_do_pci_domctl(
seg = machine_sbdf >> 16;
On 2015/6/18 18:07, Tim Deegan wrote:
At 14:13 +0800 on 12 Jun (1434118407), Chen, Tiejun wrote:
could you explain why existing guest_physmap_remove_page can't
serve the purpose so you need invent a new identity mapping
specific one? For unmapping suppose it should be common regardle
On 2015/6/18 16:05, Jan Beulich wrote:
On 18.06.15 at 09:01, wrote:
On 2015/6/18 14:29, Jan Beulich wrote:
On 18.06.15 at 08:17, wrote:
On 2015/6/17 17:24, Jan Beulich wrote:
On 17.06.15 at 11:18, wrote:
On 2015/6/17 17:02, Jan Beulich wrote:
On 17.06.15 at 10:26, wrote:
Something hits
On 2015/6/19 10:02, Chen, Tiejun wrote:
On 2015/6/18 16:05, Jan Beulich wrote:
On 18.06.15 at 09:01, wrote:
On 2015/6/18 14:29, Jan Beulich wrote:
On 18.06.15 at 08:17, wrote:
On 2015/6/17 17:24, Jan Beulich wrote:
On 17.06.15 at 11:18, wrote:
On 2015/6/17 17:02, Jan Beulich wrote:
On
On 2015/6/23 18:12, Jan Beulich wrote:
On 23.06.15 at 11:57, wrote:
--- a/xen/drivers/passthrough/vtd/iommu.c
+++ b/xen/drivers/passthrough/vtd/iommu.c
@@ -1839,7 +1839,7 @@ static int rmrr_identity_mapping(struct domain *d, bool_t
map,
while ( base_pfn < end_pfn )
Yang,
Thanks for your review.
On 2015/5/4 12:07, Zhang, Yang Z wrote:
Chen, Tiejun wrote on 2015-05-04:
While initializing VT-D we should mask interrupt message generation
to avoid receiving any interrupt as pending before enable DMA
translation, and also mask that before disable DMA engine
On 2015/5/4 16:52, Jan Beulich wrote:
On 04.05.15 at 04:16, wrote:
--- a/xen/drivers/passthrough/vtd/x86/vtd.c
+++ b/xen/drivers/passthrough/vtd/x86/vtd.c
@@ -56,7 +56,9 @@ unsigned int get_cache_line_size(void)
void cacheline_flush(char * addr)
{
+mb();
clflush(addr);
+mb();
On 2015/5/4 16:07, Jan Beulich wrote:
On 04.05.15 at 04:03, wrote:
--- a/xen/arch/x86/apic.c
+++ b/xen/arch/x86/apic.c
@@ -1319,28 +1319,37 @@ out: ;
* This interrupt should never happen with our APIC/SMP architecture
*/
+static const char *apic_fault_reasons[] =
If at all, then this s
On 2015/5/4 16:57, Jan Beulich wrote:
On 04.05.15 at 07:08, wrote:
At first I doubted this is issued by some improper cache behaviors.
Because as you see, "root_entry[0] = 80f5001" indicates we already set
that present bit. But Caching Mode bit is zero in BDW so this means
remapping hardware do
On 2015/5/4 18:52, Tian, Kevin wrote:
From: Jan Beulich [mailto:jbeul...@suse.com]
Sent: Monday, May 04, 2015 6:44 PM
On 04.05.15 at 12:39, wrote:
On 2015/5/4 16:52, Jan Beulich wrote:
On 04.05.15 at 04:16, wrote:
--- a/xen/drivers/passthrough/vtd/x86/vtd.c
+++ b/xen/drivers/passthrough/vt
On 2015/5/4 18:43, Jan Beulich wrote:
On 04.05.15 at 12:39, wrote:
On 2015/5/4 16:52, Jan Beulich wrote:
On 04.05.15 at 04:16, wrote:
--- a/xen/drivers/passthrough/vtd/x86/vtd.c
+++ b/xen/drivers/passthrough/vtd/x86/vtd.c
@@ -56,7 +56,9 @@ unsigned int get_cache_line_size(void)
void cach
On 2015/5/4 16:25, Andrew Cooper wrote:
On 04/05/2015 03:03, Tiejun Chen wrote:
Just make this readable while debug.
"debugging"
Fixed.
Signed-off-by: Tiejun Chen
In principle, I fully agree with the change. (I had an item on my todo
list to make a change like this anyway).
---
On 2015/5/5 14:02, Andrew Cooper wrote:
On 05/05/2015 05:46, Chen, Tiejun wrote:
A better approach might be:
printk(KERN_DEBUG "APIC error on CPU%u: %02lx(%02lx)", ...)
for ( i = (1<<7); i; i >>= 1 )
if ( v1 & i )
printk(", %s", apic_fault_r
On 2015/5/5 17:24, Jan Beulich wrote:
On 05.05.15 at 04:45, wrote:
Does this work for everyone?
Please first of all explain why the interfaces in asm/flushtlb.h can't
be used here (at least when flushing entire pages). Because - as
I also don't understand any reason we didn't use this previ
On 2015/5/5 23:46, Boris Ostrovsky wrote:
On 05/04/2015 05:14 AM, Andrew Cooper wrote:
On 04/05/2015 09:52, Jan Beulich wrote:
On 04.05.15 at 04:16, wrote:
--- a/xen/drivers/passthrough/vtd/x86/vtd.c
+++ b/xen/drivers/passthrough/vtd/x86/vtd.c
@@ -56,7 +56,9 @@ unsigned int get_cache_line_siz
On 2015/5/6 15:12, Jan Beulich wrote:
On 05.05.15 at 18:11, wrote:
On 05/05/2015 11:58 AM, Jan Beulich wrote:
On 05.05.15 at 17:46, wrote:
On 05/04/2015 05:14 AM, Andrew Cooper wrote:
On 04/05/2015 09:52, Jan Beulich wrote:
On 04.05.15 at 04:16, wrote:
--- a/xen/drivers/passthrough/vtd/x
On 2015/4/20 19:13, Jan Beulich wrote:
On 10.04.15 at 11:21, wrote:
--- a/tools/libxc/xc_domain.c
+++ b/tools/libxc/xc_domain.c
@@ -1665,6 +1665,46 @@ int xc_assign_device(
return do_domctl(xch, &domctl);
}
+struct xen_reserved_device_memory
+*xc_device_get_rdm(xc_interface *xch,
+
On 2015/5/6 23:34, Jan Beulich wrote:
On 06.05.15 at 17:00, wrote:
On 2015/4/20 19:13, Jan Beulich wrote:
On 10.04.15 at 11:21, wrote:
--- a/tools/libxc/xc_domain.c
+++ b/tools/libxc/xc_domain.c
@@ -1665,6 +1665,46 @@ int xc_assign_device(
return do_domctl(xch, &domctl);
}
+struct
On 2015/5/7 0:46, Michael Dexter wrote:
Hello all,
(Resend: I cropped out too much and have added 'pciconf -lv' output)
I have been working with Roger Pau Monne to bring FreeBSD Dom0 support
to a production-ready state but we appear to have hit an IOMMU issue.
Hardware: Lenovo ThinkPad T420 i
On 2015/5/7 14:04, Jan Beulich wrote:
"Chen, Tiejun" 05/07/15 4:22 AM >>>
On 2015/5/6 23:34, Jan Beulich wrote:
On 06.05.15 at 17:00, wrote:
On 2015/4/20 19:13, Jan Beulich wrote:
On 10.04.15 at 11:21, wrote:
+PERROR("Could not allocate memory.&quo
Campbell, Jackson, Wei and Stefano,
Any consideration?
I can follow up Jan's idea but I need you guys make sure I'm going to do
this properly.
Thanks
Tiejun
On 2015/5/7 10:22, Chen, Tiejun wrote:
On 2015/5/6 23:34, Jan Beulich wrote:
On 06.05.15 at 17:00, wrote:
On 2015/4/20
On 2015/5/8 2:58, Michael Dexter wrote:
Hello all,
Are you running IGD passthrough with guest OS?
On 5/6/15 7:47 PM, Chen, Tiejun wrote:
#1. Disable interrupt message generation
#2. Please add 'cpuidle=0 msi=1'
With another try, get the same with the patched kernel:
What i
On 2015/5/8 21:04, Wei Liu wrote:
Sorry for the late review.
Really thanks for taking your time :)
On Fri, Apr 10, 2015 at 05:21:52PM +0800, Tiejun Chen wrote:
This patch introduces user configurable parameters to specify RDM
resource and according policies,
Global RDM parameter:
rdm
On 2015/5/8 21:07, Wei Liu wrote:
On Fri, Apr 10, 2015 at 05:21:54PM +0800, Tiejun Chen wrote:
We will introduce the hypercall xc_reserved_device_memory_map
approach to libxc. This helps us get rdm entry info according to
different parameters. If flag == PCI_DEV_RDM_ALL, all entries
should be ex
On 2015/5/8 13:21, Michael Dexter wrote:
On 5/7/15 7:59 PM, Chen, Tiejun wrote:
Are you running IGD passthrough with guest OS?
Only as far as the PVH Xen kernel is passing through all hardware to
Dom0. Roger can elaborate as needed.
What is your CPU? BDW? HSW? And what is your FreeBSD Linux
On 2015/5/8 23:13, Wei Liu wrote:
On Fri, May 08, 2015 at 09:24:56AM +0800, Chen, Tiejun wrote:
Campbell, Jackson, Wei and Stefano,
Any consideration?
I can follow up Jan's idea but I need you guys make sure I'm going to do
this properly.
Look at my earlier reply.
Thanks for
On 2015/5/8 22:43, Wei Liu wrote:
Sorry for the late review. This series fell through the crack.
Thanks for your review.
On Fri, Apr 10, 2015 at 05:21:55PM +0800, Tiejun Chen wrote:
While building a VM, HVM domain builder provides struct hvm_info_table{}
to help hvmloader. Currently it incl
Sorry for this delay response.
On 2015/4/20 21:36, Jan Beulich wrote:
On 10.04.15 at 11:21, wrote:
--- a/xen/drivers/passthrough/vtd/iommu.c
+++ b/xen/drivers/passthrough/vtd/iommu.c
@@ -1793,8 +1793,14 @@ static void iommu_set_pgd(struct domain *d)
hd->arch.pgd_maddr = pagetable_get_pad
On 2015/5/9 0:07, Julien Grall wrote:
Hi,
On 10/04/15 10:21, Tiejun Chen wrote:
diff --git a/xen/include/public/domctl.h b/xen/include/public/domctl.h
index ca0e51e..e5ba7cb 100644
--- a/xen/include/public/domctl.h
+++ b/xen/include/public/domctl.h
@@ -493,6 +493,10 @@ DEFINE_XEN_GUEST_HANDLE(x
On 2015/4/20 21:39, Jan Beulich wrote:
On 10.04.15 at 11:21, wrote:
--- a/tools/libxc/xc_domain.c
+++ b/tools/libxc/xc_domain.c
@@ -1654,13 +1654,15 @@ int xc_domain_setdebugging(xc_interface *xch,
int xc_assign_device(
xc_interface *xch,
uint32_t domid,
-uint32_t machine_sbdf
On 2015/5/11 17:51, Julien Grall wrote:
Hi,
On 11/05/15 09:42, Chen, Tiejun wrote:
diff --git a/xen/drivers/passthrough/arm/smmu.c
b/xen/drivers/passthrough/arm/smmu.c
index 8a9b58b..a3e6383 100644
--- a/xen/drivers/passthrough/arm/smmu.c
+++ b/xen/drivers/passthrough/arm/smmu.c
@@ -2599,7
On 2015/5/11 18:57, Jan Beulich wrote:
On 11.05.15 at 11:51, wrote:
Hi,
On 11/05/15 09:42, Chen, Tiejun wrote:
diff --git a/xen/drivers/passthrough/arm/smmu.c
b/xen/drivers/passthrough/arm/smmu.c
index 8a9b58b..a3e6383 100644
--- a/xen/drivers/passthrough/arm/smmu.c
+++ b/xen/drivers
On 2015/5/11 18:53, Jan Beulich wrote:
On 11.05.15 at 11:45, wrote:
On 2015/4/20 21:39, Jan Beulich wrote:
On 10.04.15 at 11:21, wrote:
--- a/tools/libxc/xc_domain.c
+++ b/tools/libxc/xc_domain.c
@@ -1654,13 +1654,15 @@ int xc_domain_setdebugging(xc_interface *xch,
int xc_assign_device(
On 2015/5/11 19:32, Wei Liu wrote:
On Mon, May 11, 2015 at 04:09:53PM +0800, Chen, Tiejun wrote:
On 2015/5/8 22:43, Wei Liu wrote:
Sorry for the late review. This series fell through the crack.
Thanks for your review.
On Fri, Apr 10, 2015 at 05:21:55PM +0800, Tiejun Chen wrote:
While
On 2015/5/11 22:54, Wei Liu wrote:
On Mon, May 11, 2015 at 01:35:06PM +0800, Chen, Tiejun wrote:
On 2015/5/8 21:04, Wei Liu wrote:
Sorry for the late review.
Really thanks for taking your time :)
On Fri, Apr 10, 2015 at 05:21:52PM +0800, Tiejun Chen wrote:
This patch introduces user
On 2015/4/20 21:46, Jan Beulich wrote:
On 10.04.15 at 11:22, wrote:
--- a/xen/arch/x86/hvm/hvm.c
+++ b/xen/arch/x86/hvm/hvm.c
@@ -4729,7 +4729,6 @@ static long hvm_memory_op(int cmd,
XEN_GUEST_HANDLE_PARAM(void) arg)
switch ( cmd & MEMOP_CMD_MASK )
{
-case XENMEM_memory_map:
On 2015/4/20 21:51, Jan Beulich wrote:
On 10.04.15 at 11:22, wrote:
--- a/tools/libxl/libxl_dom.c
+++ b/tools/libxl/libxl_dom.c
@@ -787,6 +787,70 @@ out:
return rc;
}
+static int libxl__domain_construct_memmap(libxl_ctx *ctx,
+ libxl_domain_conf
On 2015/4/20 21:57, Jan Beulich wrote:
On 10.04.15 at 11:22, wrote:
--- a/tools/firmware/hvmloader/util.c
+++ b/tools/firmware/hvmloader/util.c
@@ -27,6 +27,16 @@
#include
#include
+int check_hole_conflict(uint64_t start, uint64_t size,
+uint64_t reserved_start, u
On 2015/4/20 22:21, Jan Beulich wrote:
On 10.04.15 at 11:22, wrote:
--- a/tools/firmware/hvmloader/pci.c
+++ b/tools/firmware/hvmloader/pci.c
@@ -59,8 +59,8 @@ void pci_setup(void)
uint32_t bar_reg;
uint64_t bar_sz;
} *bars = (struct bars *)scratch_start;
-unsigned
On 2015/4/20 22:29, Jan Beulich wrote:
On 10.04.15 at 11:22, wrote:
--- a/tools/firmware/hvmloader/e820.c
+++ b/tools/firmware/hvmloader/e820.c
@@ -73,7 +73,8 @@ int build_e820_table(struct e820entry *e820,
unsigned int lowmem_reserved_base,
unsigne
On 2015/5/15 14:12, Jan Beulich wrote:
On 15.05.15 at 04:33, wrote:
On 2015/4/20 21:46, Jan Beulich wrote:
On 10.04.15 at 11:22, wrote:
--- a/xen/arch/x86/hvm/hvm.c
+++ b/xen/arch/x86/hvm/hvm.c
@@ -4729,7 +4729,6 @@ static long hvm_memory_op(int cmd,
XEN_GUEST_HANDLE_PARAM(void) arg)
On 2015/5/15 14:25, Jan Beulich wrote:
On 15.05.15 at 08:11, wrote:
On 2015/4/20 22:29, Jan Beulich wrote:
On 10.04.15 at 11:22, wrote:
@@ -119,10 +120,6 @@ int build_e820_table(struct e820entry *e820,
/* Low RAM goes here. Reserve space for special pages. */
BUG_ON((hvm_info-
On 2015/5/15 14:35, Jan Beulich wrote:
On 15.05.15 at 08:24, wrote:
On 2015/5/15 14:12, Jan Beulich wrote:
On 15.05.15 at 04:33, wrote:
On 2015/4/20 21:46, Jan Beulich wrote:
On 10.04.15 at 11:22, wrote:
--- a/xen/arch/x86/hvm/hvm.c
+++ b/xen/arch/x86/hvm/hvm.c
@@ -4729,7 +4729,6 @@ stati
On 2015/5/15 14:16, Jan Beulich wrote:
On 15.05.15 at 04:57, wrote:
On 2015/4/20 21:51, Jan Beulich wrote:
On 10.04.15 at 11:22, wrote:
--- a/tools/libxl/libxl_dom.c
+++ b/tools/libxl/libxl_dom.c
@@ -787,6 +787,70 @@ out:
return rc;
}
+static int libxl__domain_construct_memmap(lib
On 2015/5/15 14:56, Jan Beulich wrote:
On 15.05.15 at 08:39, wrote:
On 2015/5/15 14:25, Jan Beulich wrote:
On 15.05.15 at 08:11, wrote:
Even we may separate the
low memory to construct memory_map.map[]...
???
Sorry I just mean that the low memory is not represented with only one
memory_m
On 2015/5/15 14:19, Jan Beulich wrote:
On 15.05.15 at 05:18, wrote:
On 2015/4/20 22:21, Jan Beulich wrote:
On 10.04.15 at 11:22, wrote:
--- a/tools/firmware/hvmloader/pci.c
+++ b/tools/firmware/hvmloader/pci.c
@@ -59,8 +59,8 @@ void pci_setup(void)
uint32_t bar_reg;
uin
On 2015/5/15 15:32, Jan Beulich wrote:
On 15.05.15 at 09:09, wrote:
On 2015/5/15 14:16, Jan Beulich wrote:
On 15.05.15 at 04:57, wrote:
On 2015/4/20 21:51, Jan Beulich wrote:
On 10.04.15 at 11:22, wrote:
--- a/tools/libxl/libxl_dom.c
+++ b/tools/libxl/libxl_dom.c
@@ -787,6 +787,70 @@ out:
On 2015/5/15 15:34, Jan Beulich wrote:
On 15.05.15 at 09:11, wrote:
On 2015/5/15 14:56, Jan Beulich wrote:
On 15.05.15 at 08:39, wrote:
On 2015/5/15 14:25, Jan Beulich wrote:
On 15.05.15 at 08:11, wrote:
Even we may separate the
low memory to construct memory_map.map[]...
???
Sorry I
On 2015/5/15 15:44, Jan Beulich wrote:
On 15.05.15 at 09:34, wrote:
So I think we may need to adjust pci_mem_start like this,
@@ -301,6 +301,19 @@ void pci_setup(void)
pci_mem_start <<= 1;
}
+/* Relocate PCI memory that overlaps reserved space, like RDM. */
+for
On 2015/5/15 16:12, Jan Beulich wrote:
On 15.05.15 at 10:00, wrote:
On 2015/5/15 15:34, Jan Beulich wrote:
On 15.05.15 at 09:11, wrote:
On 2015/5/15 14:56, Jan Beulich wrote:
On 15.05.15 at 08:39, wrote:
On 2015/5/15 14:25, Jan Beulich wrote:
On 15.05.15 at 08:11, wrote:
Even we may se
1 - 100 of 419 matches
Mail list logo